Hossain et al., 2018 - Google Patents
Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks.Hossain et al., 2018
View PDF- Document ID
- 6568405656755758071
- Author
- Hossain M
- Paul A
- Islam M
- Atiquzzaman M
- Publication year
- Publication venue
- Netw. Protoc. Algorithms
External Links
Snippet
Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most …
- 235000010956 sodium stearoyl-2-lactylate 0 title abstract 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10298610B2 (en) | Efficient and secure user credential store for credentials enforcement using a firewall | |
US10425387B2 (en) | Credentials enforcement using a firewall | |
US20190354709A1 (en) | Enforcement of same origin policy for sensitive data | |
Hossain et al. | Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks. | |
US8990356B2 (en) | Adaptive name resolution | |
US8683607B2 (en) | Method of web service and its apparatus | |
Humayun et al. | Industry 4.0 and cyber security issues and challenges | |
Puangpronpitag et al. | Simple and lightweight HTTPS enforcement to protect against SSL striping attack | |
EP2311218B1 (en) | Http authentication and authorization management | |
CN120266437A (en) | Identity-based application of domain filtering rules using the Domain Name System (DNS) platform | |
LaCroix et al. | Cookies and sessions: a study of what they are, how they work and how they can be stolen | |
Maidine et al. | Cloud identity management mechanisms and issues | |
Muhammad et al. | Evaluation of OpenID-Based doublefactor authentication for preventing session hijacking in web applications | |
Hallgren et al. | Glasstube: A lightweight approach to web application integrity | |
Swanink et al. | Persistent effects of man-in-the-middle attacks | |
Narula et al. | Novel Defending and Prevention Technique for Man‐in‐the‐Middle Attacks in Cyber‐Physical Networks | |
Wang et al. | Using web-referral architectures to mitigate denial-of-service threats | |
Hussain et al. | Enc‐DNS‐HTTP: Utilising DNS Infrastructure to Secure Web Browsing | |
Kurnikov et al. | Using safekeeper to protect web passwords | |
Luna | Man-in-the–Middle Attack | |
Bharti et al. | Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach | |
Tanwar | Issues and challenges in web services | |
Lin et al. | DAMUP: Practical and privacy-aware cloud-based DDoS mitigation | |
Al-Ibrahim et al. | Cookie-less browsing | |
Holik | Protecting IoT Devices with Software-Defined Networks |